You are on page 1of 14

SUBJECT NAME: COMPUTER NETWORKS

SUBJECT CODE: EC2352


UNIT I
PHYSICAL LAYER
PART A

(2 MARKS)

1. What is mean by data communication?


Data communication is the exchange of data (in the form of 1s and 0s) between two devices via some form of
transmission medium (such as a wire cable).
2. What are the three criteria necessary for an effective and efficient network?
The most important criteria are performance, reliability and security.Performance of the network depends on
number of users, type of transmission medium, and the capabilities of the connected h/w and the efficiency of
the s/w.Reliability is measured by frequency of failure, the time it takes a link to recover from the failure and
the networks robustness in a catastrophe.Security issues include protecting data from unauthorized access
and viruses.
3. What are the three fundamental characteristics determine the effectiveness of the data
communication system?
The effectiveness of the data communication system depends on three fundamental characteristics:Delivery:
The system must deliver data to the correct destination.Accuracy: The system must deliver data
accurately.Timeliness: The system must deliver data in a timely manner.
4. What are the advantages of distributed processing?
Advantages of distributed processing include security/encapsulation, distributed databases, faster problem
solving, security through redundancy and collaborative processing.
5. Why are protocols needed?
In networks, communication occurs between the entities in different systems. Two entities cannot just send bit
streams to each other and expect to be understood. For communication, the entities must agree on a protocol. A
protocol is a set of rules that govern data communication.

6. Why are standards needed?


Co-ordination across the nodes of a network is necessary for an efficient communication. If there are no
standards, difficulties arise. A standard provides a model or basis for development to which everyone has
agreed.
7. For n devices in a network, what is the number of cable links required for a mesh and ring
topology?
Mesh topology n (n-1)/2Ring topology n
8. What is the difference between a passive and an active hub?
An active hub contains a repeater that regenerates the received bit patterns before sending them out. A passive
hub provides a simple physical connection between the attached devices.
9. Distinguish between peer-to-peer relationship and a primary-secondary relationship.
Peer-to-peer relationship: All the devices share the link equally.Primary-secondary relationship: One device
controls traffic and the others must transmit through it.Assume 6 devices are arranged in a mesh topology.
10. How many cables are needed? How many ports are needed for each device?
Number of cables=n (n-1)/2=6(6-1)/2=15Number of ports per device=n-1=6-1=5
11. Group the OSI layers by function.
The seven layers of the OSI model belonging to three subgroups. Physical, data link and network layers are
the network support layers; they deal with the physical aspects of moving data from one device to another.
Session, presentation and application layers are the user support layers; they allow interoperability among
unrelated software systems. The transport layer ensures end-to-end reliable data transmission.

12. What are header and trailers and how do they get added and removed?
Each layer in the sending machine adds its own information to the message it receives from the layer just
above it and passes the whole package to the layer just below it. This information is added in the form of
headers or trailers. Headers are added to the message at the layers 6,5,4,3, and 2. A trailer is added at layer2.
At the receiving machine, the headers or trailers attached to the data unit at the corresponding sending layers
are removed, and actions appropriate to that layer are taken.The transport layer creates a communication
between the source and destination.
13. What are the three events involved in a connection?
Creating a connection involves three steps: connection establishment, data transfer and connection release.
14. What is the DC component?
Direct current is a zero-frequency signal with constant amplitude.
15. How does NRZ-L differ from NRZ-I?
In the NRZ-L sequence, positive and negative voltages have specific meanings: positive for 0 and negative for
1. in the NRZ-I sequence, the voltages are meaningless. Instead, the receiver looks for changes from one level
to another as its basis for recognition of 1s.Using HDB3, encode the bit stream 10000000000100. Assume the
number of 1s so far is odd and the first 1 is positive.
16. What are the functions of a DTE? What are the functions of a DCE?
Data terminal equipment is a device that is an information source or an information sink. It is connected to a
network through a DCE. Data circuit-terminating equipment is a device used as an interface between a DTE
and a network.
17. What does the electrical specification of EIA-232 describe?
The electrical specification of EIA-232 defines that signals other than data must be sent using OFF as less
than -3 volts and ON as greater than +3 volts. The data must be transmitted using NRZ-L encoding.
18. Discuss the mode for propagating light along optical channels.
There are two modes for propagating light along optical channels, multimode and single mode.
Multimode: Multiple beams from a light source move through the core in different paths.
Single mode: Fiber with extremely small diameter that limits beams to a few angles, resulting in an almost
horizontal beam.
19. What is refraction?
The phenomenon related to the bending of light when it passes from one medium to another.
20. How are the guided media differing from unguided transmission media?
Guided transmission media Unguided transmission mediaGuided indicate, medium is contained 1.Unguided
medium does not have any within physical boundary Physical boundaryTransmission takes place through
wire. 3. It is a wireless transmission.AmplitudeTime
10000000000100
21. What are the disadvantages of optical fiber as a transmission medium?
The disadvantages of optical fiber are 1.Very expensive. 2.Installation and maintenance is difficult.3.Fragility.
22. What are the criteria used to evaluate transmission medium?
The criteria used to evaluate transmission medium are 1.Throughput 2.Propagation speed 3.Propagation time
4.Wavelength
23. Give the relationship between propagation speed and propagation time?
Propagation time = distance / propagation speedThe time required for a signal or a bit to travel from one point
to another is called Propagation time.Propagation speed is the distance, a signal or a bit travel through a
medium in one second.
24. Explain cross talk and what is needed to reduce it?
Effect of one wire on another is called as cross talk. One wire will be the sending antenna and the other wire
will be the receiving antenna. We can use the shielded twisted pair cable or coaxial cable for transmission,
which contains metal foil to reduce cross talk.

PART B

(16 MARKS)

25. What is the difference between a protocol and a service interface? Explain your answer in terms of the
ISO seven layer models. (16 marks) Apr/May2008
26. Explain how guided media differ from unguided media? Briefly explain any three methods used for
data transmission using guided media and two methods used for data transmission using unguided
media. (16 marks) Apr/May2008
27. Explain Layers in OSI model. (8 mark) Nov\Dec2007
28. Explain the Star and Bus topologies of computer networks. (8 marks) Nov\Dec2007
29. Explain about Coaxial cable and Fiber Optics media for communication. (8 marks) Nov\Dec2007
30. Explain about the transmission modes available for data flow. (4 marks) Nov\Dec2007
31. List four properties by which transmission media can differ. (4) May/Jun 2007
32. Three packets switching networks each contain n nodes. The networks has a star topology has a star
topology with a central switch, a ring respectively and a third is fully interconnected with a wire form
every node to every other node. What are the best, average and worst case transmission paths in hops?
(12) May/Jun 2007
33. Describe the key elements of protocols and the standards. (8) May/Jun 2007
34. Explain in detail the data transmission in OSI reference model. (8) May/Jun 2007
35. What is a Protocol? List the three key elements of a protocol. Nov/Dec2006
36. With relevant examples differentiate between simplex, half duplex and full duplex communication.
Nov/Dec2006
37. A Sine wave completes one cycle in 25 is. What is its frequency? Express the frequency in KHz.
Nov/Dec2006
38. A digital signal has a bit interval of 40 is. What is the bit rate? Express the bit rate in Kbps.
Nov/Dec2006
39. An analog signal carries four bits in each signal element. If 1000 signal elements are sent per second,
find the baud rate and the bit rate. Nov/Dec2006
40. Discuss the role played by repeaters in Terrestrial Microwave communication? Is the distance between
repeaters fixed? Discuss. Nov/Dec2006
41. A network has n devices. Determine the number of cable links required for a mesh, ring, bus and
star topology. Nov/Dec2006
42. Explain Layers in OSI Model.
43. Compare the Star and Bus Topologies of Computer Network.
44. Give a Detail description about the following
a. Coaxial Cable
b. Fiber Optics
45. Explain in detail about the following
a. Transmission modes
b. Categories of network
46. Describe the key elements of Protocol and standards.
47. Explain in detail about 56K modems.
48. Explain how guided media differ from unguided media? Briefly explain Any two methods of data
transmission using unguided media

UNIT II
DATA LINK LAYER
PART A
(2 MARKS)
49. What are the responsibilities of data link layer?
Specific responsibilities of data link layer include the following.a) Framingb) Physical addressingc) Flow
controld) Error controle) Access control
50. Mention the types of errors.
There are 2 types of errorsa) Single-bit error.b) Burst-bit error.
51. Define the following terms.
a) Single bit error: The term single bit error means that only one bit of a given data unit (such as byte
character/data unit or packet) is changed from 1 to 0 or from 0 to 1.b) Burst error: Means that 2 or
more bits in the data unit have changed from 1 to 0 from 0 to 1.
52. What is redundancy?
It is the error detecting mechanism, which means a shorter group of bits or extra bits may be appended at the
destination of each unit.
53. List out the available detection methods.
There are 4 types of redundancy checks are used in data communication.a) Vertical redundancy checks
(VRC).b) Longitudinal redundancy checks (LRC).c) Cyclic redundancy checks (CRC).
d) Checksum.
54. Write short notes on VRC.
The most common and least expensive mechanism for error detection is the vertical redundancy check (VRC)
often called a parity check. In this technique a redundant bit called a parity bit, is appended to every data unit
so, that the total number of 0s in the unit (including the parity bit) becomes even.
55. Write short notes on LRC.
In longitudinal redundancy check (LRC), a block of bits is divided into rows and a redundant row of bits is
added to the whole block.
56. Write short notes on CRC.
The third and most powerful of the redundancy checking techniques is the cyclic redundancy checks (CRC)
CRC is based on binary division. Here a sequence of redundant bits, called the CRC remainder is appended to
the end of data unit.
57. Write short notes on CRC generator.
A CRC generator uses a modulo-2 division.a. In the first step, the 4 bit divisor is subtracted from the first 4 bit
of the dividend.b. Each bit of the divisor is subtracted from the corresponding bit of the dividend without
disturbing the next higher bit.
58. Write short notes on CRC checker.
A CRC checker functions exactly like a generator. After receiving the data appended with the CRC it does the
same modulo-2 division. If the remainder is all 0s the CRC is dropped and the data accepted. Otherwise, the
received stream of bits is discarded and the dates are resent.
59. Define checksum.
The error detection method used by the higher layer protocol is called checksum. Checksum is based on the
concept of redundancy.
60. What are the steps followed in checksum generator?
The sender follows these stepsThe units are divided into k sections each of n bits.All sections are added
together using 2s complement to get the sum.The sum is complemented and become the checksum.The
checksum is sent with the data.
61. List out the steps followed is checksum checker side.
The receiver must follow these stepsThe unit is divided into k section each of n bits.All sections are added
together using 1s complement to get the sum.The sum is complemented.If the result is zero.

62. Write short notes on error correction.


It is the mechanism to correct the errors and it can be handled in 2 ways.When an error is discovered, the
receiver can have the sender retransmit the entire data unit.A receiver can use an error correcting coder, which
automatically corrects certain errors.
63. Mention the types of error correcting methods.
There are 2 error-correcting methods. 1. Single bit error correction 2. Burst error correction.
64. What is the purpose of hamming code?
A hamming code can be designed to correct burst errors of certain lengths. So the simple strategy used by the
hamming code to correct single bit errors must be redesigned to be applicable for multiple bit correction.
65. Define flow control.
Flow control refers to a set of procedures used to restrict the amount of data. The sender can send before
waiting for acknowledgment.
66. What is a buffer?
Each receiving device has a block of memory called a buffer, reserved for storing incoming data until they are
processed.
67. Mention the categories of flow control.
There are 2 methods have been developed to control flow of data across communication links.Stop and waitsend one from at a time.Sliding window- send several frames at a time.
68. Define ARQ.
Error control in the data link layer is based on Automatic repeat request (ARQ), which means retransmission
of data in 3 cases. 1.Damaged frame 2.Lost frame 3.Lost acknowledgment.
69. Mention the function of go-back N-ARQ.
It is the popular mechanism for continuous transmission error control. In the method, if our frame is lost or
damaged, all frames sent since the last frame acknowledged are retransmitted.
70. What is selective reject ARQ?
In selective reject ARQ only the specific damaged or lost frame is retransmitted. If a frame is corrupted in
transit, a NAK is returned and the frame is resent out of sequence.
71. Define HDLC.
It is a bit-oriented data link protocol designed to support both half-duplex and full duplex communication over
point to point and midpoint links.
72. What are the different communication modes in HDLC?
HDLC supports 3 modes of communication between stations 1.Normal response mode (NRM)
2.Asynchronous response mode (ARM) 3.Asynchronous balanced mode (ABM)
73. Mention the types of frames in HDLC.
There are 3 types of HDLC frames. 1.Information frames (I-frames) 2. Supervisory frames (S-frames) 3.
Unnumbered frames (U-frames)
74. Give the usage of I, S, U frames.
I frames used to transport user data and control information relating to user data.S frames used only to
transport control information, primarily data link layer and error controls.U frames reserved for systems
management.
75. What is meant by bit stuffing?
Bit stuffing is the process of adding one extra 0 whenever there are 5 consecutive in the data so that the
receiver doesnt mistake the data for a flag.
76. Define LAN.
A Local Area Network (LAN) is a data communication system that allows a number of independent devices
to communicate directly with each other in a limited geographic area.
77. Mention the various architecture in a LAN.
LAN is dominated by 4 architectures. 1.Ethernet 2.Token bus 3.Token ring 4.Fiber distributed data interface
(FDDI)

78. Define a standard 802.3


IEEE 802.3 supports a LAN standard originally developed by Xerox and later extended by a joint venture
between digital equipment corporations. Intel Corporation and Xerox. This was called Ethernet.
79. Write short notes on FDDI.
Fiber distributed data interface is a local areas. Network protocol standardized by ANSI and ITU-7. It
supports data rates of 100 Mbps and provides a high-speed alternative to Ethernet and token ring access
method used here is token passing.
80. Describe the three HDLC station types?
The three HDLC station types are:Primary station: The primary station has the complete control of the link.
The Primary station sends commands to the secondary station.Secondary station: The secondary station sends
responses.Combined station: The combined station is one which acts either as a primary or a Secondary,
depending upon the nature and direction of the transmission. Combined station sends both commands and
responses.
81. What is piggy backing?
Piggy backing means combining data to send and acknowledgement of the frame received in one single
frame. Piggy backing can save bandwidth because the overhead from a data frame and an ACK frame can be
combined into just one frame
82. Name the four types of S-frames?
The four types of S-frames are 1.Receive ready (RR).The value of the code sub field is 00 2.Receive not ready
(RNR). The value of the code sub field is 10 3.Reject (REJ). The value of the code sub field is 01 4.Selective
reject (SREJ). The value of the code sub field is 11
PART B

(16 MARKS)

83. Go-back-n and selective-reject are two basic approaches to deal with transmission errors. Compare the
two approaches in terms of storage and bandwidth requirements. (8 marks) Apr/May2008
84. With the aid of a packet sequence (timing) diagram, show the operation of go-back-n when a data
packet/ACK-packet/NAK-packet is corrupted. (8 marks) Apr/May2008
85. Station A has two frames in a queue ready to send at the same time. On an 802.3 CSMA/CD network,
is it guaranteed that Station Bs frame will be transmitted before the second frame of Station A is
transmitted? Why? What is the answer for the same scenario on an 802.5 token ring network? Assume
all frames have the same priority. (16) Nov\Dec2007
86. Explain CRC error detection mechanism with an example. (8 marks) Nov\Dec2007
87. Explain HDLC in detail. (8 marks) Nov\Dec2007)
88. Explain the frame format of IEEE 802.3 and IEEE 802.5 in detail. (10 marks) May/Jun 2007
89. What is CSMA/CD? Explain. (6 marks) May/Jun 2007
90. How does the 802.11 media access control protocol ensure that the receiver has a greater Chance to
transmit the acknowledgement frame before any other wireless stations grab the media? Does it
always guarantee that the acknowledgement frame sent by the receiver will not collide with another
frame transmitted by another wireless station? (8) May/Jun 2007
91. Describe the collision avoidance mechanism used in 802.11 wireless LAN. In particular, how such a
mechanism solves the hidden terminal problem. (8) May/Jun 2007
92. Describe two approaches by which packet loss is detected in a Go back N ARQ protocol and
Selective Repeat. Nov/Dec2006
93. A block of 32 bits has to be transmitted. Discuss how the thirty two bit block is transmitted to the
receiver using Longitudinal Redundancy Check. Nov/Dec2006
94. Consider a 32 bit block of data 11100111 11011101 00111001 10101001 that has to be
transmitted. If Longitudinal Redundancy Check is used what is the transmitted bit stream?
95. In the Hamming code, for a data unit of m bits how you do compute the number of redundant bits r
needed? Nov/Dec2006

96. What kinds of errors can Vertical Redundancy check determine? What kinds of errors it cannot
determine? Nov/Dec2006
97. List the three main functions performed by the data link layer of the ISO OSI model. Nov/Dec2006
98. Explain the working of Carrier Sense Multiple Access protocol. Nov/Dec2006
99. How does a Token Ring LAN operate? Discuss. Nov/Dec2006
100.
List and briefly discuss the two different basic transmission technologies that can be used to set
up wireless LANs. Nov/Dec2006
101. Explain CRC error detection mechanism with an example.
102. Explain HDLC in Detail.
103. Describe two approaches by which packet loss is detected in Go-back-N ARQ protocol and Selective
Repeat protocol.
104. Explain Hamming Code with an Example.
105. Discuss Stop and Wait protocol.
106. Discuss Sliding window protocol

UNIT III
NETWORK LAYER
PART A
(2 MARKS)
107. What are the network support layers and the user support layers?
Network support layers:The network support layers are Physical layer, Data link layer and Network layer.
These deals with electrical specifications, physical connection, transport timing and reliability.User support
layers:The user support layers are: Session layer, Presentation layer, Application layer. These allow
interoperability among unrelated software system.
108. With a neat diagram explain the relationship of IEEE Project to the OSI model?
The IEEE has subdivided the data link layer into two sub layers:Logical link control (LLC)Medium access
control (MAC)LLC is non-architecture specific. The MAC sub layer contains a number of distinct modules,
each carries proprietary information specific to the LAN product being used.
109. What are the functions of LLC?
The IEEE project 802 model takes the structure of an HDLC frame and divides it into 2 sets of functions. One
set contains the end user portion of the HDLC frame the logical address, control information, and data.
These functions are handled by the IEEE 802.2 logical link control (LLC) protocol.
110. What are the functions of MAC?
MAC sub layer resolves the contention for the shared media. It contains synchronization, flag, flow and error
control specifications necessary to move information from one place to another, as well as the physical
address of the next station to receive and route a packet.
111. What are headers and trailers and how do they get added and removed?
The control data added to the beginning of a data is called headers. The control data added to the end of a data
is called trailers. At the sending machine, when the message passes through the layers each layer adds the
headers or trailers. At the receiving machine, each layer removes the data meant for it and passes the rest to
the next layer.
112. What are the responsibilities of network layer?
The network layer is responsible for the source-to-destination delivery of packet across multiple network
links. The specific responsibilities of network layer include the following:Logical addressing.Routing.
113. What is a virtual circuit?
A logical circuit made between the sending and receiving computers. The connection is made after both
computers do handshaking. After the connection, all packets follow the same route and arrive in sequence.

114. What are data grams?


In datagram approach, each packet is treated independently from all others. Even when one packet represents
just a place of a multipacket transmission, the network treats it although it existed alone. Packets in this
technology are referred to as datagram.
115. What is meant by switched virtual circuit?
Switched virtual circuit format is comparable conceptually to dial-up line in circuit switching. In this method,
a virtual circuit is created whenever it is needed and exits only for the duration of specific exchange.
116. What is meant by Permanent virtual circuit?
Permanent virtual circuits are comparable to leased lines in circuit switching. In this method, the same virtual
circuit is provided between two uses on a continuous basis. The circuit is dedicated to the specific uses.
117. Define Routers.
Routers relay packets among multiple interconnected networks. They Route packets from one network to any
of a number of potential destination networks on internet routers operate in the physical, data link and
network layer of OSI model.
118. What is meant by hop count?
The pathway requiring the smallest number of relays, it is called hop-count routing, in which every link is
considered to be of equal length and given the value one.
119. What is time-to-live or packet lifetime?
As the time-to-live field is generated, each packet is marked with a lifetime, usually the number of hops that
are allowed before a packet is considered lost and accordingly, destroyed. The time-to-live determines the
lifetime of a packet.
120. Write the keys for understanding the distance vector routing.
The three keys for understanding the algorithm areKnowledge about the whole networksRouting only to
neighborsInformation sharing at regular intervals
121. How the packet cost referred in distance vector and link state routing?
In distance vector routing, cost refer to hop count while in case of link state routing, cost is a weighted value
based on a variety of factors such as security levels, traffic or the state of the link.
122. How the routers get the information about neighbor?
A router gets its information about its neighbors by periodically sending them short greeting packets. If the
neighborhood responds to the greeting as expected, it is assumed to be alive and functioning. If it dose not, a
change is assumed to have occurred and the sending router then alerts the rest of the network in its next LSP.
123. Define IP address.
IP address is the 3-bit number for representing a host or system in the network. One portion of the IP address
indicates a networking and the other represents the host in a network.
124. What is Token Bus?
Token Bus is a physical bus that operates as a logical ring using tokens. Here stations are logically organized
into a ring. A token is passed among stations. If a station wants to send data, it must wait and capture the
token. Like Ethernet, station communicates via a common bus.
125. What is token passing?
Stations may attempt to send data multiple times before a transmission makes it onto a link. This redundancy
may create delays of indeterminable length if the traffic is heavy. Token ring resolves this uncertainty by
requiring that stations take turns sending data. Each station may transmit only during its turn and may send
only one frame during each turn. The mechanism that coordinates this rotation is called token passing.
126. What are the rules of boundary-level masking?
The rules of boundary-level maskingThe bytes in the IP address that corresponds to 255 in the mask will be
repeated in the sub network addressThe bytes in the IP address that corresponds to 0 in the mask will change
to 0 in the sub network address
127. What are the rules of no boundary-level masking?
The bytes in the IP address that corresponds to 255 in the mask will be repeated in the sub network
addressThe bytes in the IP address that corresponds to 0 in the mask will change to 0 in the sub network
addressFor other bytes, use the bit-wise AND operator

128. What is LSP?


In link state routing, a small packet containing routing information sent by a router to all other router by a
packet called link state packet.
PART B

(16 MARKS)

129. Given the network topology below, use a link-state algorithm to compute the shortest path from A to
all other nodes. Make sure to show the results of the computation at each step. (16 marks)
Apr/May2008
130. How do subletting and super netting enhance scalability? What is the purpose of a subnet mask and
a superset (CIDR) mask? Is a subnet mask visible outside an IP network? Is a CIDR mask visible
outside an IP network? Apr/May2008
131. Explain about Special IP addresses in detail. (8 marks) Nov\Dec2007
132. A company is granted the site address 201.70.64.0. The company needs 6 subnets. Design the
subnets. (8 marks) Nov\Dec2007
133. Explain Link state routing. (8 marks) Nov\Dec2007
134. Explain Routing table and Routing module. (8 marks) Nov\Dec2007
135. How is the looping problem solved by switches and by routers? How do switches and byrouters.
How do switches/routers handle link failure? (8) May/Jun 2007
136. Explain the IP addressing. (8) May/Jun 2007
137. Compare and Contrast Link State and Distance Vector algorithms. (8) May/Jun 2007
138. In the virtual circuit network service model, before a virtual circuit is setup, the source router needs
to specify a path (e.g., the shortest path) from the source to the destination. What additional
information do we need to maintain in the routing table to support this function? Write down the
resulting routing table. (8) May/Jun 2007
139. State which layers of the ISO OSI model does the following interconnecting devices operate.
Nov/Dec2006
140. State the major difference between Distance Vector Routing and Link State Routing. Discuss how
these routing techniques work. Nov/Dec2006
141. What is sub netting? Discuss. Also state which classes of IP address can be sub netted.
Nov/Dec2006
142. What is subnet masking? Discuss. Nov/Dec2006
143. How can we prove that we have 2, 147, 48, 648 address in class A? Nov/Dec2006
144. What is the sub network address if the destination address is 200.45.34.56 and the subnet mask is
255.255.240.0? Nov/Dec2006
145. Write in detail about the Distance Vector Routing Algorithm
146. Write in detail about the Link State Routing Algorithm
147. Explain the routing algorithm which underlies the Dijistras algorithm principle.

UNIT IV
TRANSPORT LAYER
PART A
(2 MARKS)
148. What is function of transport layer?
The protocol in the transport layer takes care in the delivery of data from one application program on
one device to an application program on another device. They act as a link between the upper layer protocols
and the services provided by the lower layer.
149. What is the difference between network layer delivery and the transport layer delivery?
Network layer delivery Transport layer deliveryThe network layer is responsible for the source-to-destination
delivery of packet across multiple network links. The transport layer is responsible for source-to-destination
delivery of the entire message.
150. What are the four aspects related to the reliable delivery of data?
The four aspects are,Error controlSequence controlLoss controlDuplication control
151. What is meant by segment?
At the sending and receiving end of the transmission, TCP divides long transmissions into smaller data units
and packages each into a frame called a segment.
152. What is meant by segmentation?
When the size of the data unit received from the upper layer is too long for the network layer datagram or data
link layer frame to handle, the transport protocol divides it into smaller usable blocks. The dividing process is
called segmentation.
153. What is meant by Concatenation?
The size of the data unit belonging to a single session are so small that several can fit together into a single
datagram or frame, the transport protocol combines them into a single data unit. The combining process is
called concatenation.
154. What are the types of multiplexing?
The types of multiplexing are,Upward multiplexingDownward multiplexing
155. What are the two possible transport services?
Two basic types of transport services are,Connection serviceConnectionless services
The transport layer creates the connection between source and destination.
156. What are the three events involved in the connection?
For security, the transport layer may create a connection between the two end ports. A connection is a single
logical path between the source and destination that is associated with all packets in a message. Creating a
connection involves three steps:
Connection establishmentData transfer & Connection release.
157. What is meant by congestion?
Congestion in a network occurs if user sends data into the network at a rate greater than that allowed by
network resources.
158. Why the congestion occur in network?
Congestion occurs because the switches in a network have a limited buffer size to store arrived packets.
159. How will the congestion be avoided?
The congestion may be avoided by two bitsBECN - Backward Explicit Congestion Notification
FECN - Forward Explicit Congestion Notification
160. What is the function of BECN BIT?
The BECN bit warns the sender of congestion in network. The sender can respond to this warning by simply
reducing the data rate.
161. What is the function of FECN?
The FECN bit is used to warn the receiver of congestion in the network. The sender and receiver are
communicating with each other and are using some types of flow control at a higher level.

162. What is meant by quality of service?


The quality of service defines a set of attributes related to the performance of the connection. For each
connection, the user can request a particular attribute each service class is associated with a set of attributes.
163. What is frame?
A frame consists of one complete cycle of time slots, including one or more slot dedicated to each sending
device.
164. What is the difference between service point address, logical address and physical address?
Service point addressing
The transport layer header
includes a type of address
called a service point address
or port address, which makes a
data delivery from a specific
process on one computer to a
specific process on another
computer.

PART B

Logical addressing
If a packet passes the network
boundary we need another
addressing to differentiate the
source
and
destination
systems. The network layer
adds a header, which indicates
the logical address of the
sender and receiver.

Physical addressing
If the frames are to be
distributed
to
different
systems on the network, the
data link layer adds the
header, which defines the
source machines address and
the destination machines
address.

(16 MARKS)

165. Compare and contrast the two TCP/IP transport protocols: TCP and UDP, in terms of demultiplexing,
reliability, and flow control. How does TCP identify a connection? Is the information needed for this
identification readily available to the TCP software in the received TCP segment? Explain. With the
help of a diagram, explain how a connection is established in TCP. (16 marks) Apr/May2008
166. How many RTTs does it take until the senders congestion window reaches 1Mbytes? Recall that the
congestion window is initialized to the size of a single segment, and assume that the slow-start
threshold is initialized to a value higher than the receivers advertised window. If the time to send the
file is given by the number of required RTTs times the RTT value, what is the effective throughput for
the transfer? What percentage of the link bandwidth is utilized? (16 marks) Apr/May2008
167. Explain Four-way Handshaking method to terminate a connection in TCP? (4 marks) Nov\Dec2007
168. Explain about TCP Congestion control technique in detail. (8 marks) Nov\Dec2007
169. What is Silly Window Syndrome? How do you avoid it? (8 marks) Nov\Dec2007
170. If UDP does not provide any service guarantees or reliable transfer, why cant application directly
access IP and do without it? Explain UDP in details. (16) Nov\Dec2007
171. What is QoS in internetworking? State the technique to improve QoS. (16). May/Jun 2007
172. List and discuss the various primitives for a simple transport service. Nov/Dec2006
173. DNS can use the services of UDP or TCP using port 53. Discuss when UDP is used and when TCP
is used. Nov/Dec2006
174. Highlight the features of UDP and briefly discuss the same. Nov/Dec2006
175. Discuss connection establishment and connection release in TCP. Nov/Dec2006
176. Discuss how TCP provides reliability using error control. Nov/Dec2006
177. Discuss the strategies TCP uses to avoid congestion. Nov/Dec2006
178. Explain the Nagles and Karns Algorithm in detail.
179. Explain the two way handshake and the three way handshake procedures in detail.
180. Explain the steps followed in Socket programming.
181. Differentiate TCP and UDP. Explain their frame formats in detail.
182. Explain in detail the techniques for achieving good quality of service.
183. Discuss the TCP Finite State Machine in detail.

184. Differentiate Connection oriented service and connectionless oriented service


185. Explain the duties of Transport Layer.
UNIT V
APPLICATION LAYER
PART A
(2 MARKS)
186. Discuss the three main division of the domain name space.
Domain name space is divided into three different sections: generic domains, country domains & inverse
domain.Generic domain: Define registered hosts according to their generic behavior, uses generic
suffixes.Country domain: Uses two characters to identify a country as the last suffix.Inverse domain: Finds
the domain name given the IP address.
187. Discuss the TCP connections needed in FTP.
FTP establishes two connections between the hosts. One connection is used for data transfer, the other for
control information. The control connection uses very simple rules of communication. The data connection
needs more complex rules due to the variety of data types transferred.
188. Discuss the basic model of FTP.
The client has three components: the user interface, the client control process, and the client data transfer
process. The server has two components: the server control process and the server data transfer process. The
control connection is made between the control processes. The data connection is made between the data
transfer processes.
189. What is the function of SMTP?
The TCP/IP protocol supports electronic mail on the Internet is called Simple Mail Transfer (SMTP). It is a
system for sending messages to other computer users based on e-mail addresses. SMTP provides mail
exchange between users on the same or different computers.
190. What is the difference between a user agent (UA) and a mail transfer agent (MTA)?
The UA prepares the message, creates the envelope, and puts the message in the envelope. The MTA transfers
the mail across the Internet.
191. How does MIME enhance SMTP?
MIME is a supplementary protocol that allows non-ASCII data to be sent through SMTP. MIME transforms
non-ASCII data at the sender site to NVT ASCII data and deliverers it to the client SMTP to be sent through
the Internet. The server SMTP at the receiving side receives the NVT ASCII data and delivers it to MIME to
be transformed back to the original data.
192. Why is an application such as POP needed for electronic messaging?
Workstations interact with the SMTP host which receives the mail on behalf of every host in the organization,
to retrieve messages by using a client-server protocol such as Post Office Protocol , version 3(POP3).
Although POP3 is used to download messages from the server, the SMTP client still needed on the desktop to
forward messages from the workstation user to its SMTP mail server.
193. Write down the three types of WWW documents.
The documents in the WWW can be grouped into three broad categories: static, dynamic and active.Static:
Fixed-content documents that are created and stored in a server.Dynamic: Created by web server whenever a
browser requests the document.Active: A program to be run at the client side.
194. What is the purpose of HTML?
HTML is a computer language for specifying the contents and format of a web document. It allows additional
text to include codes that define fonts, layouts, embedded graphics and hypertext links.
195. Define CGI.
CGI is a standard for communication between HTTP servers and executable programs. It is used in crating
dynamic documents.

196. Name four factors needed for a secure network.


Privacy: The sender and the receiver expect confidentiality.
Authentication: The receiver is sure of the senders identity and that an imposter has not sent the
message.Integrity: The data must arrive at the receiver exactly as it was sent.Non-Reputation: The receiver
must able to prove that a received message came from a specific sender.
197. How is a secret key different from public key?
In secret key, the same key is used by both parties. The sender uses this key and an encryption algorithm to
encrypt data; the receiver uses the same key and the corresponding decryption algorithm to decrypt the data.
In public key, there are two keys: a private key and a public key. The private key is kept by the receiver. The
public key is announced to the public.
198. What is a digital signature?
Digital signature is a method to authenticate the sender of a message. It is similar to that of signing
transactions documents when you do business with a bank. In network transactions, you can create an
equivalent of an electronic or digital signature by the way you send data.
199. What are the advantages & disadvantages of public key encryption?
Advantages:
Remove the restriction of a shared secret key between two entities. Here each entity can create a pair of keys,
keep the private one, and publicly distribute the other one.
The no. of keys needed is reduced tremendously. For one million users to communicate, only two million
keys are needed.
Disadvantage:
If you use large numbers the method to be effective. Calculating the cipher text using the long keys takes a lot
of time. So it is not recommended for large amounts of text.
200. What are the advantages & disadvantages of secret key encryption?
Advantage:
Secret Key algorithms are efficient: it takes less time to encrypt a message. The reason is that the key is
usually smaller. So it is used to encrypt or decrypt long messages.
Disadvantages:
Each pair of users must have a secret key. If N people in world want to use this method, there needs to be N
(N-1)/2 secret keys. For one million people to communicate, a half-billion secret keys are needed.
The distribution of the keys between two parties can be difficult.
201. Define permutation.
Permutation is transposition in bit level.Straight permutation: The no. of bits in the input and output are
preserved.Compressed permutation: The no. of bits is reduced (some of the bits are dropped).
Expanded permutation: The no. of bits is increased (some bits are repeated)
202. Define substitutional & transpositional encryption.
Substitutional: A character level encryption in which each character is replaced by another character in the
set.Transpositional: A Character level encryption in which the characters retain their plaintext but the position
of the character changes.
PART B

(16 MARKS)

203. You are going to use a terminal of the host xyz.cse.edu to write an email from your email account to
my email account, with the content I wanna pass! Write down in sequence the commands in SMTP,
along with any necessary argument, that you need to use to send this email. (16 marks) Apr/May2008
204. Describe with an example how does a HTTP request retrieves the document usr/users/doc/doc 1.Use
atleast two general headers, two request headers and one entity header. Show the response if the
document has moved to usr/deads/doc 1 and if there is a syntax error in the request. (16 marks)
Apr/May2008
205. Explain the followings related with FTP:

a) Connections and communications (8 marks) Nov\Dec2007


b) Commands (8 marks) Nov\Dec2007
206. Explain the followings related with HTTP:
(i) Messages (8 marks) (ii) Headers (8 marks) Nov\Dec2007
207. What are the following acronym SMTP, FTP, WWW and HTTP stand for? Explain their uses and
state the strengths and weaknesses of each of them.(16) May/Jun 2007
208. Explain in role of a DNS on a computer network, including its involvement in the process of a user
accessing a web page. (8) May/Jun 2007
209. Describe about symmetric key Cryptography. (8) May/Jun 2007
210. With a relevant example discuss how the domain space is divided. Nov/Dec 2006
211. Distinguish between a fully qualified domain name and a partially qualified domain name. Give
relevant example. Nov/Dec 2006
212. Discuss how Simple Mail Transfer Protocol (SMTP) works? Can multimedia messages be transmitted
using SMTP? Discuss. Is Common Gateway Interface a language? Discuss. Nov/Dec 2006
213. Differentiate Symmetric and Asymmetric Key encryption techniques in detail.
214. Differentiate double and 3 DES
215. Explain the different types of authentication protocol in detail.
216. Write short notes on RSA and Digital Signature.
217. Explain in detail about Kerberos authentication System
218. What are the different Substitution techniques?
219. Discuss about the simple mail transfer protocol.
220. Discuss in detail about DNS.

You might also like